Search Results - "Koay, Abigail"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges by Koay, Abigail M. Y., Ko, Ryan K. L, Hettema, Hinne, Radke, Kenneth

    Published in Journal of intelligent information systems (01-04-2023)
    “…The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS)…”
    Get full text
    Journal Article
  2. 2

    Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network by Shafi, Qaisar, Basit, Abdul, Qaisar, Saad, Koay, Abigail, Welch, Ian

    Published in IEEE access (2018)
    “…Extensive adoption of intelligent devices with ubiquitous connectivity has increased Internet of Things (IoT) traffic tremendously. The smart devices promise…”
    Get full text
    Journal Article
  3. 3

    Benchmarking and learning garbage collection delays for resource‐restricted graphical user interfaces by McCarthy, Harry, Koay, Abigail, Dawson, Michael, Kent, Kenneth B., Patros, Panos

    Published in Software, practice & experience (01-01-2022)
    “…Tablets, smartphones, and wearables have limited resources. Applications on these devices employ a graphical user interface (GUI) for interaction with users…”
    Get full text
    Journal Article
  4. 4

    Comparison Of Pretrained Feature Extractors For Glaucoma Detection by Gunasinghe, Hansi, McKelvie, James, Koay, Abigail, Mayo, Michael

    “…Glaucoma identification is often performed manually by medical professionals, which is time consuming. Automated image analysis (e.g. of retinal fundus images)…”
    Get full text
    Conference Proceeding
  5. 5

    Embedding Java Classes with code2vec: Improvements from Variable Obfuscation by Compton, Rhys, Frank, Eibe, Patros, Panos, Koay, Abigail

    “…Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML…”
    Get full text
    Conference Proceeding
  6. 6

    A new multi classifier system using entropy-based features in DDoS attack detection by Koay, Abigail, Chen, Aaron, Welch, Ian, Seah, Winston K. G.

    “…Entropy-based features have been widely utilized for detecting DDoS attacks in recent years. However, existing approaches mainly focus on using a small number…”
    Get full text
    Conference Proceeding
  7. 7

    Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization by Wilton, Jonathan, Koay, Abigail M. Y, Ko, Ryan K. L, Xu, Miao, Ye, Nan

    Published 16-10-2022
    “…The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are…”
    Get full text
    Journal Article
  8. 8

    Maintaining SLOs of Cloud-Native Applications Via Self-Adaptive Resource Sharing by Podolskiy, Vladimir, Mayo, Michael, Koay, Abigail, Gerndt, Michael, Patros, Panos

    “…With changing workloads, cloud service providers can leverage vertical container scaling (adding/removing resources) so that Service Level Objective (SLO)…”
    Get full text
    Conference Proceeding
  9. 9

    Embedding Java Classes with code2vec: Improvements from Variable Obfuscation by Compton, Rhys, Frank, Eibe, Patros, Panos, Koay, Abigail

    Published 06-04-2020
    “…Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML…”
    Get full text
    Journal Article
  10. 10

    Plan2Defend: AI Planning for Cybersecurity in Smart Grids by Choi, Taejun, Ko, Ryan K L, Saha, Tapan, Scarsbrook, Joshua, Koay, Abigail MY, Wang, Shunyao, Zhang, Wenlu, Clair, Connor St

    “…AI Planning (or Automated Planning) is a sub-field within AI which has been applied to several information security sub-fields, particularly vulnerability…”
    Get full text
    Conference Proceeding